PT0-002 · Question #86
PT0-002 Question #86: Real Exam Question with Answer & Explanation
Sign in or unlock PT0-002 to reveal the answer and full explanation for question #86. The question stem and answer options stay visible for context.
Question
A penetration tester is reviewing the following SOW prior to engaging with a client: "Network diagrams, logical and physical asset inventory, and employees' names are to be treated as client confidential. Upon completion of the engagement, the penetration tester will submit findings to the client's Chief Information Security Officer (CISO) via encrypted protocols and subsequently dispose of all findings by erasing them in a secure manner." Based on the information in the SOW, which of the following behaviors would be considered unethical? (Choose two.)
Options
- AUtilizing proprietary penetration-testing tools that are not available to the public or to the client for
- BUtilizing public-key cryptography to ensure findings are delivered to the CISO upon completion of
- CFailing to share with the client critical vulnerabilities that exist within the client architecture to
- DSeeking help with the engagement in underground hacker forums by sharing the client's public IP
- EUsing a software-based erase tool to wipe the client's findings from the penetration tester's laptop
- FRetaining the SOW within the penetration tester's company for future use so the sales team can
Unlock PT0-002 to see the answer
You've previewed enough free PT0-002 questions. Unlock PT0-002 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.